Re: and security constraints

2013-04-23 Thread Mark Thomas
On 20/04/2013 07:04, David Jencks wrote: > Hi Mark, > > I hope my being tired doesn't come across as being unpleasant… if so > I apologize in advance. Not at all. No need to apologize. > I think a lot of the security discussion in the servlet spec is vague > and misleading. I think the JACC spe

Re: and security constraints

2013-04-22 Thread Jeremy Boynes
On Apr 21, 2013, at 11:37 PM, David Jencks wrote: > On Apr 21, 2013, at 3:56 PM, Jeremy Boynes wrote: > >> On Apr 19, 2013, at 11:04 PM, David Jencks wrote: >>> IMO you have misinterpreted roles in the ee specs. The specs including the >>> servlet spec define application roles and base the d

Re: and security constraints

2013-04-21 Thread David Jencks
On Apr 21, 2013, at 3:56 PM, Jeremy Boynes wrote: > On Apr 19, 2013, at 11:04 PM, David Jencks wrote: >> IMO you have misinterpreted roles in the ee specs. The specs including the >> servlet spec define application roles and base the declarative security >> constraints on them. Then you can

Re: and security constraints

2013-04-21 Thread Jeremy Boynes
On Apr 19, 2013, at 11:04 PM, David Jencks wrote: > IMO you have misinterpreted roles in the ee specs. The specs including the > servlet spec define application roles and base the declarative security > constraints on them. Then you can map strings that bits of the application > like, at leas

Re: and security constraints

2013-04-19 Thread David Jencks
Hi Mark, I hope my being tired doesn't come across as being unpleasant… if so I apologize in advance. I think a lot of the security discussion in the servlet spec is vague and misleading. I think the JACC spec provides a firmer basis for thinking about how security is supposed to work. IMO y

and security constraints

2013-04-19 Thread Mark Thomas
Currently, Tomcat only checks against elements if there is a call to isUserInRole(). Prior to Servlet 3.0 this made sense. The person deploying the web application has control over web.xml and hence the security roles (those used in security constraints) but no control over application roles (thos